Greg greg
  • Joined on 2018-11-05
greg commented on issue kosmos/gitea.kosmos.org#27 2019-06-20 09:16:18 +00:00
Ark backups stopped being performed

I have also deleted the heptio-ark namespace and the matching service account and IAM. Closing this one

greg closed issue kosmos/gitea.kosmos.org#27 2019-06-20 09:16:18 +00:00
Ark backups stopped being performed
greg commented on issue kosmos/gitea.kosmos.org#27 2019-06-20 09:13:51 +00:00
Ark backups stopped being performed

Hooray, that did the trick:

greg commented on issue kosmos/gitea.kosmos.org#27 2019-06-19 16:38:32 +00:00
Ark backups stopped being performed

I ended up switching to Velero 1.0 (Ark got renamed at version 0.11) using the new installation process that's part of the velero binary and using a new bucket. I could not figure out what was wrong with the current bucket. The same error was happening with velero as it did with our previous Ark setup.

greg created pull request kosmos/gitea.kosmos.org#28 2019-06-19 16:35:47 +00:00
Update the documentation, Ark is now Velero
greg pushed to feature/ark_to_velero at kosmos/gitea.kosmos.org 2019-06-19 16:35:18 +00:00
a3fa72bb56 Update the documentation, Ark is now Velero
greg opened issue kosmos/gitea.kosmos.org#27 2019-06-19 13:53:12 +00:00
Ark backups stopped being performed
greg closed pull request kosmos/chef#68 2019-06-19 12:06:12 +00:00
WIP: Replace the certbot systemd unit with a cron job with notifications
greg commented on issue kosmos/chef#68 2019-06-19 12:06:12 +00:00
WIP: Replace the certbot systemd unit with a cron job with notifications

You're right, I misunderstood, that would work with the cerbot systemd timer as it is (systemctl status --full certbot will contain the previous error). I'm going to close this and reopen another pull request that does it with a OnFailure section on the certbot service instead

greg pushed to bugfix/3-certbot_email_notifications at kosmos/chef 2019-06-19 09:11:10 +00:00
6f98d07942 Add the quiet switch to the certbot command
greg commented on issue kosmos/chef#68 2019-06-19 09:09:17 +00:00
WIP: Replace the certbot systemd unit with a cron job with notifications

Damnit, certbot is using stderr to output warnings, so we got an email when it ran at midnight:

greg commented on issue kosmos/chef#68 2019-06-18 16:30:11 +00:00
WIP: Replace the certbot systemd unit with a cron job with notifications

I checked, no other change is needed for cron jobs so far, the backup gem is already successfully sending emails when warnings or errors occur (independently of using cron).

greg created pull request kosmos/chef#68 2019-06-18 16:28:18 +00:00
Replace the certbot systemd unit with a cron job with notifications
greg pushed to bugfix/3-certbot_email_notifications at kosmos/chef 2019-06-18 16:27:36 +00:00
d879eb88b1 Replace the certbot systemd unit with a cron job with notifications
greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-17 15:40:17 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

Update: SSH doesn't work with a DaemonSet in front of the haproxy-ingress controller, they already have an SSH daemon running on port 22 on the nodes.

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-17 15:08:21 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

Running a LoadBalancer in front of the ingress controller is one solution that I found works on GKE, I did not say it was the only way

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-17 14:19:44 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

I got haproxy-ingress to work without a LoadBalancer on GKE, using a DaemonSet for the Ingress controller. That way the haproxy Ingress controller runs on every Kubernetes node (4 in our case) and is accessible from the outside through each node's public IP

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-17 12:49:36 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

The GKE pricing is really confusing, I'm trying to find a definitive answer on the Ingress pricing. My previous understanding was that you can run one Ingress to replace multiple LoadBalancers too

greg commented on issue kosmos/gitea.kosmos.org#26 2019-06-17 09:43:03 +00:00
WIP: Set up ingress with Let's Encrypt certificates using cert-manager

A LoadBalancer is needed on GKE when using an Ingress controller that's not built-in. The built-in Ingress controller is for HTTP(S), and can serve traffic directly without a LoadBalancer. Here is a tutorial about deploying ingress-nginx on GKE, with a LoadBalancer in front of the ingress controller (https://cloud.google.com/community/tutorials/nginx-ingress-gke). And the docs about HTTP(S) load balancing with Ingress on GKE: https://cloud.google.com/kubernetes-engine/docs/concepts/ingress

greg commented on issue kosmos/chef#3 2019-06-17 09:16:02 +00:00
Cron jobs & systemd timers fail silently

We're using systemd timers to run certbot, so now this issue is about both cron jobs and system timers. I'm going to work on that one